Can the TV show 'Mr. Robot' teach us anything useful about how to deal with cybercrime? Credit: Thinkstock With season three of “Mr. Robot” now on our screens we are in for another Hollywood-eye view into the murky world of cybercrime. The series’ main character, Elliot Alderson, a network technician by day and hacker by night, meets all our preconceived notions of a cybercriminal – young, male, introverted, and surgically attached to his black hoody. But stereotypes aside, “Mr. Robot” is hailed by many in the cyber security world as the most realistic portrayal of hacker culture to-date, could it potentially provide some insight into the psychology of cyber criminals?Understanding the motivation and intent behind cyberattacks is as much a part of fighting cybercrime as is using sophisticated technologies to detect and eliminate threats.After all, cyber criminals use psychological manipulation to increase the effectiveness of their activities by preying upon human emotions of fear, anger, and embarrassment with ransomware attacks or phishing attacks exploiting the overwhelmed executive. As such, there is no reason why CISOs should not turn the tables and leverage psychology to identify key trends and behaviors to combat these criminal practices. The key motivations behind cybercrime can be broken down into three broad categories:Financial gainThe most obvious motivation behind cybercrime has traditionally been financial gain – both directly in the form of ransom payments and infiltrating financial systems, or indirectly, including stealing valuable data to be sold. To some, cybercrime is simply a way of making a living and is often more lucrative than using their skills for legitimate activities. Participants are lured into groups or networks by the promise of financial reward, often without fully understanding the legal or ethical implications of what they are doing. Political or social ideologyIdeology is a second motivation for cybercrime, illustrated by a high-profile hack in 2014, which forced Sony Pictures to pull a controversial movie. These types of activities are often referred to as hacktivism – supposedly a more socially acceptable form of cyber criminality – and attacks are usually carried out in response to a perceived injustice. The “fsociety” network depicted in “Mr. Robot” places itself in this hacktivist category, aiming to eradicate consumer debt by encrypting the financial data of a global corporation. EntertainmentIn a similar way to trolling, cyberattacks can be carried out purely for the thrill. Perpetrators may be bored, wanting to rebel against the establishment, or seeking to outsmart their victims. And the perceived glamour and secretiveness of a hacker network – especially one with distinct branding like Anonymous – can seem exciting. Belonging to such a group makes individuals feel they are not personally responsible for their actions, and the apparent anonymity of the internet gives the impression those actions are less likely to have legal or social ramifications. Psychological profiling within cybercrime is like that of other types of crime. Using geographic profiling to look at where the offender lives, works, and plays is often a less reliable indicator given today’s edgeless networks, but similar patterns do exist in the digital world, especially when the individual is part of an organized network in constant communication. Inductive profiling, which uses behavioral patterns and demographic characteristics can be combined with deductive profiling which uses digital forensic evidence. Security researchers – also known as white-hat hackers – employed by penetration testing companies to try to breach the defenses of systems and identify vulnerabilities that need fixing, provide CISOs with a view into the hacking underworld. As well as intentionally hacking into systems, these researchers can follow and interact with criminal communities to understand trends and predict attacks.There can be a fine line between legitimate cyber security investigation and criminal behavior, evidenced by the arrest of Marcus Hutchins – the British security researcher credited with stopping the WannaCry ransomware – on suspicion of creating a banking virus. But the experiences of security researchers can be invaluable in better understanding the mind of their black-hat counterparts. In fact, the apparent technological authenticity of Mr. Robot is credited to writer and technology producer, Kor Adana, who was formerly employed to test the security of car computers by attempting to hack into them.The latest season of “Mr. Robot” is pure entertainment, but there is a serious message buried within its plot. The more intelligence CISOs have about cyber threats and the people behind them, the more likely these threats are to be detected and remediated quickly. By combining a deeper understanding of the psychological motivation behind cybercrime, security officers can finally get one step ahead of cyber criminals with technological tools to detect and prevent attacks – whether they’re wearing their stereotypical black hoodies or not. Related content opinion Are your employees unwittingly invalidating your cyber liability insurance? To prevent unintentional invalidation of their policies, businesses must educate employees on a number of related issues. By Kirsten Bay Mar 12, 2018 6 mins Technology Industry IT Skills Data and Information Security opinion IoT for its own sake is causing needless security headaches CSOs should carefully consider whether every IoT device is necessary, or if the benefit versus risk balance is incorrectly weighted. By Kirsten Bay Jan 23, 2018 5 mins Data and Information Security Internet of Things Privacy opinion The security tech stack is out of control, here is what to do about it The importance of taking a multi-layered approach for CISOs to keep attacks at bay, combining prevention with detecting and acting upon suspicious activity as it is happening. By Kirsten Bay Oct 11, 2017 4 mins Network Security Security opinion When it comes to the cloud, do CISOs have their heads in the sand? Not only has the cloud enabled companies to access multiple applications online via Software as a Service (SaaS), but it has also made internal infrastructure more agile and scalable, and fueled flexible workforce collaboration. This shift towards st By Kirsten Bay Aug 04, 2017 4 mins Cloud Security Network Security Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe